Microsoft: The Internet needs more trust to grow

The Internet needs to be more trustworthy if it wants to grow, according to Microsoft's senior security executive, Scott Charney.

In a video posted to Microsoft's Web site ahead of Charney's keynote at next week's RSA security conference, Microsoft's Corporate Vice President of Trustworthy Computing described how anonymity on the Internet is increasingly being exploited by cyber criminals. "We need to push back on anonymity and lack of traceability," he said.

"Because the Internet can be anonymous and untraceable, criminals flock to the Internet," Charney explained. "Today too many people do not know what software is running on their machine and often they have malware. They often don't know who they're communicating with, whether an e-mail they've received is spoofed or from some unknown sender even when it appears to come from someone they know. When they visit Web sites, they don't know if that Web site is to be trusted or not."

"For all of these reasons we need End-to-End Trust," Charney said.

End-to-End Trust is a security marketing initiative introduced by Microsoft Chief Research and Strategy Officer Craig Mundie at last year's RSA conference. Keynoting next Tuesday, Charney is expected to give an update on the initiative, which the company has thusfar billed as an effort to engage industry, consumers and policy makers in a serious discussion of online security problems. His video was posted this week on a revamped version of Microsoft's End-to-End Trust Web site.

As the world's dominant supplier of software, Microsoft is constantly in the crosshairs of attackers. Even as the company has taken steps to lock down its flagship Windows operating system, hackers have exploited countless flaws in the programs that run on top of it, such as Office and Internet Explorer.

Microsoft would like to give its users a better idea of whether a Web site or e-mail attachment is trustworthy. But how you identify people on the Internet without raising serious privacy concerns? It's a problem that Microsoft hopes to solve first by engaging in discussion.

"We've been talking about this since last year, spending a lot of time with the policy makers," said Doug Leland, general manager of Microsoft's Identity and Security Business Group, in an interview. "This is an agenda we're trying to advance with the reset of the industry and with policy makers and lawmakers and law enforcement as a proposal of a solution to tackle a very significant problem."

Last September, for example, Microsoft made a submission to the Internet Safety Technical Task Force, a group looking at ways to improve online safety for children. Microsoft's paper (pdf) advocated the replacement of Web user names and passwords with Information Card systems, such as Microsoft's own CardSpace technology, and calling on a collaboration between government, industry and child development experts to solve the problem.

Microsoft has been working with a number of countries, including Singapore, Belgium, the U.K. and France to develop government-issued digital credentials, Leland said.

In his video, Charney called for a "model where people get in-person proof and then can pass digital identities on the Internet. So, for example, if you got a drivers license or a passport and it also had a digital certificate on it, you could later pass your identity to a site along with your credit card number for example and they would know you are who you claim to be."

But Microsoft doesn't think these digital IDs should be mandatory.

In December, Charney sent a letter to the Attorney General Richard Blumenthal of Connecticut and Roy Cooper of North Carolina arguing that any move toward mandatory digital IDs "would not only compromise privacy but would have a chilling effect on other important social values such as freedom of expression."

Instead of centralized digital IDs, Microsoft is pushing a concept known as federated identity, where different organizations develop ways to share and trust identity information about their users. With CardSpace, Microsoft has been careful to give users the ability to decide what information they want to share.

"The way in which Microsoft has been thinking about it has been very constructive," said John Palfrey, a co-director of Harvard's Berkman Center, which published the Internet Safety Task Force report. "They would leave all or virtually all of the decision making in the hand of the users."

Charney's RSA keynote, entitled "End to End Trust: A Collaborative Effort" is set to be delivered Tuesday morning. RSA runs at San Francisco's Moscone Center from Monday to Friday next week.
Brand PostESET Smart Security 8More from Eset

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.

Contact Us

With over 25 years of brand awareness and credibility, Good Gear Guide (formerly PC World Australia), consistently delivers editorial excellence through award-winning content and trusted product reviews.